The SCEAS System
Navigation Menu

Conferences in DBLP

ASIACRYPT (asiacrypt)
1990 (conf/asiacrypt/1990)

  1. Alfred Menezes, Scott A. Vanstone
    The Implementation of Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:2-13 [Conf]
  2. Kenji Koyama
    Direct Demonstration of the Power to Break Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:14-21 [Conf]
  3. Zong-Duo Dai, Kencheng Zeng
    Continued Fractions and the Berlekamp-Massey Algorithm. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:24-31 [Conf]
  4. Guang Gong
    Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:32-36 [Conf]
  5. Yi Xian Yang
    K-M Sequence is Forwardly Predictable. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:37-38 [Conf]
  6. Cunsheng Ding
    Lower Bounds on the Weight Complexities of Cascaded Binary Sequences. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:39-43 [Conf]
  7. Pil Joong Lee
    Secure User Access Control for Public Networks. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:46-57 [Conf]
  8. Svein J. Knapskog
    Formal Specification and Verification of Secure Communication Protocols. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:58-73 [Conf]
  9. Vijay Varadharajan
    Network Security Policy Models. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:74-95 [Conf]
  10. Jan C. A. van der Lubbe, Dick E. Boekee
    KEYMEX: An expert system for the design of key management schemes. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:96-103 [Conf]
  11. Klaus Gaarder, Einar Snekkenes
    On The Formal Analysis of PKCS Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:106-121 [Conf]
  12. Martin Anthony, Keith M. Martin, Jennifer Seberry, Peter R. Wild
    Some Remarks on Authentication Systems. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:122-139 [Conf]
  13. Kazuo Ohta, Kenji Koyama
    Meet-in-the-Middle Attack on Digital Signature Schemes. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:140-154 [Conf]
  14. Cees J. A. Jansen, Dick E. Boekee
    A Binary Sequence Generator Based on Ziv-Lempel Source Coding. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:156-164 [Conf]
  15. Miodrag J. Mihaljevic, Jovan Dj. Golic
    A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:165-175 [Conf]
  16. Reihaneh Safavi-Naini
    Parallel Generation of Pseudo-Random Sequences. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:176-193 [Conf]
  17. Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
    Large Primes in Stream Cipher Cryptography. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:194-205 [Conf]
  18. Helen Gustafson, Ed Dawson, William J. Caelli
    Comparison of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:208-220 [Conf]
  19. Lawrence Brown, Jennifer Seberry
    Key Scheduling In Des Type Cryptosystems. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:221-228 [Conf]
  20. Lawrence Brown, Josef Pieprzyk, Jennifer Seberry
    LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:229-236 [Conf]
  21. Josef Pieprzyk, Xian-Mo Zhang
    Permutation Generators of Alternating Groups. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:237-244 [Conf]
  22. David Chaum
    Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:246-264 [Conf]
  23. Marc Girault
    A (non-practical) three-pass identification protocol using coding theory. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:265-272 [Conf]
  24. Hiroki Shizuya, Kenji Koyama, Toshiya Itoh
    Demonstrating Possession without Revealing Factors and its Application. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:273-293 [Conf]
  25. Barry Hayes
    Anonymous One-Time Signatures and Flexible Untraceable Electronic Cash. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:294-305 [Conf]
  26. Yi Xian Yang
    Dyadic Matrices and Their Potential Significance in Cryptography. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:308-310 [Conf]
  27. Rudolf Lidl, Winfried B. Müller
    A Note on Strong Fibonacci Pseudoprimes. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:311-317 [Conf]
  28. Cees J. A. Jansen, Dick E. Boekee
    On the Significance of the Directed Acyclic Word Graph in Cryptology. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:318-326 [Conf]
  29. Kencheng Zeng, Minqiang Huang
    Solving Equations in Sequences. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:327-332 [Conf]
  30. Ronald Ferreira
    The Practical Application Of State Of The Art Security In Real Environments. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:334-355 [Conf]
  31. Rodney H. Cooper, Wayne Patterson
    RSA as a Benchmark for Multiprocessor Machines. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:356-359 [Conf]
  32. Vangalur S. Alagar
    Range Equations and Range Matrices: a Study in Statistical Database Security. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:360-385 [Conf]
  33. Thomas Hardjono
    Record Encryption in Distributed Databases. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:386-395 [Conf]
  34. Willi Geiselmann, Dieter Gollmann
    VLSI Design for Exponentiation in GF (2n). [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:398-405 [Conf]
  35. Hikaru Morita
    A Fast Modular-multiplication Module for Smart Cards. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:406-409 [Conf]
  36. Michael Newberry
    Minòs: Extended User Authentication. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:410-423 [Conf]
  37. Ed Dawson, Bruce Goldburg
    Universal Logic Sequences. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:426-432 [Conf]
  38. John M. Carroll
    The Three Faces of Information Security. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:433-450 [Conf]
  39. Mark Ames
    Secure Cryptographic Initialisation. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:451-462 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002